General
-
Target
460ad856298bbeef4b112cb888055296_JaffaCakes118
-
Size
475KB
-
Sample
241015-f1bhxs1djn
-
MD5
460ad856298bbeef4b112cb888055296
-
SHA1
fe5f5bc54e98c02e8119a6d86a72c3a94e755c7c
-
SHA256
8ccd42bbaf4f9df006e379a2a3aa45107157995cf62bd70d8de997cf6f7c2cf0
-
SHA512
75f49c14623af3dff5e7d50660e71ac5add3d60d93c89a75ab27f0044c72fb6615a4ac90089d2b6c80fc614ec1e356dfc4b1e049dac2eb064c11060a7fdb21e7
-
SSDEEP
12288:l3taORhPVcmcjwNRkwfJptUO76UJ4roU7h7AN3gB+M9eZaPRsXvo0AKqgqV:l3kOTKUYAC9UAoShsKB+ML/
Static task
static1
Behavioral task
behavioral1
Sample
460ad856298bbeef4b112cb888055296_JaffaCakes118.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
460ad856298bbeef4b112cb888055296_JaffaCakes118.exe
Resource
win10v2004-20241007-en
Malware Config
Extracted
agenttesla
Protocol: smtp- Host:
mail.dianaglobalmandiri.com - Port:
587 - Username:
[email protected] - Password:
Batam2019
Targets
-
-
Target
460ad856298bbeef4b112cb888055296_JaffaCakes118
-
Size
475KB
-
MD5
460ad856298bbeef4b112cb888055296
-
SHA1
fe5f5bc54e98c02e8119a6d86a72c3a94e755c7c
-
SHA256
8ccd42bbaf4f9df006e379a2a3aa45107157995cf62bd70d8de997cf6f7c2cf0
-
SHA512
75f49c14623af3dff5e7d50660e71ac5add3d60d93c89a75ab27f0044c72fb6615a4ac90089d2b6c80fc614ec1e356dfc4b1e049dac2eb064c11060a7fdb21e7
-
SSDEEP
12288:l3taORhPVcmcjwNRkwfJptUO76UJ4roU7h7AN3gB+M9eZaPRsXvo0AKqgqV:l3kOTKUYAC9UAoShsKB+ML/
-
AgentTesla
Agent Tesla is a remote access tool (RAT) written in visual basic.
-
AgentTesla payload
-
Disables Task Manager via registry modification
-
Drops file in Drivers directory
-
Unsecured Credentials: Credentials In Files
Steal credentials from unsecured files.
-
Accesses Microsoft Outlook profiles
-
Suspicious use of SetThreadContext
-